Trustworthiness and Authentication in Ubiquitous Computing

Hannan Xiao, James Malcolm, B. Christianson, Y. Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In a pervasive computing environment, principle authentication veries if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect
him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approaches for implementing trustworthy authentication and related work are also presented.
Original languageEnglish
Title of host publicationProcs 10th ACM Symposium on Mobility Management and Wireless Access
PublisherACM Press
Pages135-138
Number of pages4
ISBN (Print)978-1-4503-1623-1
Publication statusPublished - Oct 2012

Keywords

  • ubiquitous computing
  • authentication
  • trust
  • trustworthiness
  • , trustworthy authentication

Fingerprint

Dive into the research topics of 'Trustworthiness and Authentication in Ubiquitous Computing'. Together they form a unique fingerprint.

Cite this